There have been rumours recently that mobile phones may be allowed to be turned on on planes in the near future. So what was the risk of having them turned on anyways? Would the plane really fall out of the sky?

“Con games,” “Scam,” “Stratagem (deception),” and “Confidence trick” are all terms used to express the attempt to defraud a person after first gaining their confidence. Fraud, in all its forms, has been a very difficult issue to deal with for all countries over the years. And since the internet has become a sort of a big, free and easy to access social network in itself, cybercrooks can easily leverage its perks in order to distribute malicious software and all kinds of scams.

Spring is upon us, and that means it’s time to start baring those legs and shoulders. It’s also time for BullGuard to share with you some spring break safety and security tips. These tips are especially important to take note of if you plan on taking a Spring Break. So here we go:

A recent study showed that out of one billion email messages analyzed in a six-month period, dozens had been subject to “longline” phishing attacks. These attacks were so efficient that over 10% of the recipients were tricked into clicking on malicious content capable of taking complete control of PCs and compromising corporate networks.

We’ve all got that friend on Facebook who shares too much. And maybe you’ve heard of a friend of a friend that got fired for a Facebook post – well it’s true. You can get fired for what you put on your social media profiles.

With all the hacks we’ve been hearing about lately, the need for stronger and unique passwords has become more stringent than ever. Good thing researchers are constantly seeking new ways to enhance the safety and ease of use of online authentication systems. It is possible that in a not so distant future we may even be able to authenticate using pass thoughts instead of passwords.

Unless you live under a rock, you’ve no doubt heard about North Korea’s recent threats of a missile launch. Unfortunately, that’s not their only form of attack. A few weeks ago, South Korea experienced a synchronized cyberattack, but investigators have yet to identify the culprit. Of course, the number one suspect is North Korea.

Security researchers have recently discovered a new Android Trojan that can harvest a victim’s contact list, send and intercept SMS (text) messages, make phone calls (including calls to premium numbers), and install additional malware packages – all at the same time.

A recent study shows that higher education is failing to prepare students for cyberthreats. Considering what a large part of our lives is consumed by the internet and our devices, it’s surprising that we’re not teaching our children more about the online world.